Hacking
The Process of attempting to gain or
successfully gaining,unauthorized access
to computer resources for the purpose of
help or secure system is called “Hacking”.
The person who do it is called “Hacker”.
 Just for fun.
 Show Off.
 Hack Other Systems Secretly.
 Steal Important Information.
 Destroy Enemy’s Computer Network during
the War.
 Website Hacking
 Network Hacking
 Ethical Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Hacking a Website means taking control from the
website owner to a person who hacks the Website.
Network Hacking is generally means gathering
information about domain by using tools like
Telnet,NS look UP,Ping Tracert Netstat ,etc over the
network.
Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches
them.
Email hacking is illicit access to an email account or
email correspondence.
Password Hacking is the process of recovering
secret passwords from data that has been stored in
or transmitted by a computer system.
Online Banking hacking Unauthorized accessing
bank accounts without knowing the password or
without permission of account holder is known as
Online Banking hacking.
Computer Hacking is when files on your Computer
are viewed,created or edited without your
Authorization.
 Can be used to recover lost information
where the computer has been lost.
 Teaches you that no technology is 100%
secure.
 To test how good security is on your own
network.
 They call it white hat Computer hacking.
 Criminals can use it to their advantage.
 It can harm somone’s privacy.
 It’s Illegal.
 Keep your password protected .Write your
password should be with combination of
characters ,digits,special symbols.Do not
respond to feck on fishing email .when you
are doing any online transection always keep
watch on site whether the protocol of site is
http OR there is a Lock symbol.
Bareet Singh
xxxxxxxxxx@gmail.com
Cont No: xxxxx12345
Prabhjeet Singh
yyyyyyyyyy@gmail.com
Cont No: 98370xxxxx
PowerPoint Presentation: Hacking

PowerPoint Presentation: Hacking

  • 1.
  • 2.
    The Process ofattempting to gain or successfully gaining,unauthorized access to computer resources for the purpose of help or secure system is called “Hacking”. The person who do it is called “Hacker”.
  • 3.
     Just forfun.  Show Off.  Hack Other Systems Secretly.  Steal Important Information.  Destroy Enemy’s Computer Network during the War.
  • 4.
     Website Hacking Network Hacking  Ethical Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 5.
    Hacking a Websitemeans taking control from the website owner to a person who hacks the Website.
  • 6.
    Network Hacking isgenerally means gathering information about domain by using tools like Telnet,NS look UP,Ping Tracert Netstat ,etc over the network.
  • 7.
    Ethical hacking iswhere a person hacks to find weaknesses in a system and then usually patches them.
  • 8.
    Email hacking isillicit access to an email account or email correspondence.
  • 9.
    Password Hacking isthe process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 10.
    Online Banking hackingUnauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online Banking hacking.
  • 11.
    Computer Hacking iswhen files on your Computer are viewed,created or edited without your Authorization.
  • 12.
     Can beused to recover lost information where the computer has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat Computer hacking.
  • 13.
     Criminals canuse it to their advantage.  It can harm somone’s privacy.  It’s Illegal.
  • 14.
     Keep yourpassword protected .Write your password should be with combination of characters ,digits,special symbols.Do not respond to feck on fishing email .when you are doing any online transection always keep watch on site whether the protocol of site is http OR there is a Lock symbol.
  • 15.
    Bareet Singh xxxxxxxxxx@gmail.com Cont No:xxxxx12345 Prabhjeet Singh yyyyyyyyyy@gmail.com Cont No: 98370xxxxx